Analysis

  • max time kernel
    36s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:24

General

  • Target

    9848ce81fd16294ff6ddb08141e1e5ee609a506a3ec62e5809724c223534b0e1.exe

  • Size

    3.6MB

  • MD5

    c5f4579a1c5f04a2dd11d388a8a8127b

  • SHA1

    5ee5ba933846823a262034a7554ef65c4d0a54b9

  • SHA256

    9848ce81fd16294ff6ddb08141e1e5ee609a506a3ec62e5809724c223534b0e1

  • SHA512

    83c36b65a74f783f22caf2e15382e71250326972389acb8d9b30a85d309aff2cdabab04b6cd849039460f8db4e2da9f629c7231c00f4a2ff910980fdba83dfe2

  • SSDEEP

    49152:2U9oNaEjUMxTG9Dxn2vqEmSBm4yxRNSdJiZ+2H7w:IxTIn2yEmSBm4y/NSdJiZLH

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9848ce81fd16294ff6ddb08141e1e5ee609a506a3ec62e5809724c223534b0e1.exe
    "C:\Users\Admin\AppData\Local\Temp\9848ce81fd16294ff6ddb08141e1e5ee609a506a3ec62e5809724c223534b0e1.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1776
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.x64.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\system32\regsvr32.exe
        /s "C:\Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.x64.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.dat
    Filesize

    4KB

    MD5

    adc4d9ebf767bb20dd1dccdda030c1e6

    SHA1

    26220b74c64f9eda053bc2e4b82e590abe9e26aa

    SHA256

    4a0f787b54d508424e63b9e788da19aa83a79164c3238e48a9652166fdc6ed7c

    SHA512

    8dcea002f58ff7c2ffc65b7fb4dc9fa10bda975e425a9e0ac8e7b2c4f3aa565e8adaf73ffa3205688dab026d45806744947905d8d1fd32c12a55faa139038a09

  • C:\Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.tlb
    Filesize

    3KB

    MD5

    b1a4e76275892ad545a7d719916e3695

    SHA1

    4f45032610fe523709dddc6328df2ab41bfc6821

    SHA256

    9024103b19d15599b22e4d43d2943a53b32d6d8748ce604d47a4dc7215c003f2

    SHA512

    80162657386e57db4acf69f9efc4617772adb6ac2b2b1a61d9233b2084327b9fd89a20e2ae69ff4bf768ea991fd43dfb75274adb387e2319eecf4a4e9a5ff3f0

  • C:\Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.x64.dll
    Filesize

    692KB

    MD5

    4d04114c6d8e09e4016804a11c4cbff2

    SHA1

    e5a20bc2ba6e5659bfaa91aac9ec01ed525acb8a

    SHA256

    4f7e6a67018e3234042f194ad9f693b28361e278c1d1fc3418211e96d9f7748f

    SHA512

    da05e86be651703d03c2b3f41ab8bf8a9d97614a27e5fe6edbab7f2e7c4996d796c1a9cb8633f7d5fdb9ad054250ecc00e8fc9ba4dccfdd33e299b20789f3022

  • \Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.dll
    Filesize

    614KB

    MD5

    fe244b3aac644eadd90f578b1275438e

    SHA1

    5d132d5be73f07706f4f9581af4738400a8f62b6

    SHA256

    189c8adf5b5bc1ddeae2b272f14761c83c68c462d541e4130abcb15f853cd8b5

    SHA512

    1f764e2a1fdf8a0aeec9c2eed1316a6f3b41b3249093928767134e3cb38905b5171ecb37a6c8ca90be4b601ba8701e7a756eb37794b3173aafb9989b15f88b7c

  • \Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.x64.dll
    Filesize

    692KB

    MD5

    4d04114c6d8e09e4016804a11c4cbff2

    SHA1

    e5a20bc2ba6e5659bfaa91aac9ec01ed525acb8a

    SHA256

    4f7e6a67018e3234042f194ad9f693b28361e278c1d1fc3418211e96d9f7748f

    SHA512

    da05e86be651703d03c2b3f41ab8bf8a9d97614a27e5fe6edbab7f2e7c4996d796c1a9cb8633f7d5fdb9ad054250ecc00e8fc9ba4dccfdd33e299b20789f3022

  • \Program Files (x86)\GGoSave\3C1hXgWfiNHSmE.x64.dll
    Filesize

    692KB

    MD5

    4d04114c6d8e09e4016804a11c4cbff2

    SHA1

    e5a20bc2ba6e5659bfaa91aac9ec01ed525acb8a

    SHA256

    4f7e6a67018e3234042f194ad9f693b28361e278c1d1fc3418211e96d9f7748f

    SHA512

    da05e86be651703d03c2b3f41ab8bf8a9d97614a27e5fe6edbab7f2e7c4996d796c1a9cb8633f7d5fdb9ad054250ecc00e8fc9ba4dccfdd33e299b20789f3022

  • memory/1416-67-0x0000000000000000-mapping.dmp
  • memory/1416-68-0x000007FEFB731000-0x000007FEFB733000-memory.dmp
    Filesize

    8KB

  • memory/1560-63-0x0000000000000000-mapping.dmp
  • memory/1776-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
    Filesize

    8KB

  • memory/1776-55-0x0000000000D40000-0x0000000000DE6000-memory.dmp
    Filesize

    664KB